Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 08:05

General

  • Target

    567d10dc616a037e225b1a669a2cf7f9_JaffaCakes118.exe

  • Size

    5.6MB

  • MD5

    567d10dc616a037e225b1a669a2cf7f9

  • SHA1

    5341202e2572b57293fdb1ba328f2656e5ee4da2

  • SHA256

    95b27d71fe29def39d849d337649ef73d189262a10f9e35dca407176c98bdc2f

  • SHA512

    25e541fcc518c408ac5f453fc8ede349d186cd984cc8b8ad774a29fbd874ce15eb6c65d164371d55ae5f9265bde73cb3cd8eea067a52ecb9b09b49a6cf744b4a

  • SSDEEP

    98304:5XdiSRAXXY2Ru8/fFxRtJSr9lXzPKk1/73esGItrROT4u27Mr3XQ7FsQvsw0R:5tiSRCXY2H/fFxRzojb1/rGIIXQ7SN

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/892778422043041873/gYqLiMf-cpigl0WIlIn8gWAFktijHzZBx8-bcU6yxyaLimlCeY0552wy36J78fXd1Na8

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\567d10dc616a037e225b1a669a2cf7f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\567d10dc616a037e225b1a669a2cf7f9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
      "C:\Users\Admin\AppData\Local\Temp\Insidious.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2752
    • C:\Users\Admin\AppData\Local\Temp\Netsh Gang Bat.exe
      "C:\Users\Admin\AppData\Local\Temp\Netsh Gang Bat.exe"
      2⤵
      • Executes dropped EXE
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Insidious.exe

    Filesize

    274KB

    MD5

    2449b1ed616ff673f7207683e618c36a

    SHA1

    2324a0a9228eb38895256f6e4b38508e3ad3fbf9

    SHA256

    a01857befcc1726e1026037eefaede516b0ade74ed196cb87c2bf4ee17096923

    SHA512

    84789d137c3a1617aa670d72296a5346d9f341d4a9bad20336bce1a36452272a6b5aac0f340bf3e6642329146685ad21de8e12962863bf1d9c698f6c6cbdb886

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    457B

    MD5

    f756c76dd6941c81374acc52f0030cf6

    SHA1

    66a1e5e14da4ec7ea9c22ba7bcd0e8063313a120

    SHA256

    e25aa97077398b508c5e516b3dc1321f87416e21b7cc67a6ae283c00fa2e3fac

    SHA512

    91b070eb21b1788e38ba7b8af28f264874ddb22b6ccb6996c069b19e2db1454f0565fe898b185e010691d2148b049a9fe097416b5b60d96f6a83124ba81886e6

  • \Users\Admin\AppData\Local\Temp\Netsh Gang Bat.exe

    Filesize

    122KB

    MD5

    22f7d003c8304329e091ec4d12da5936

    SHA1

    0d96344082ad8a05c4d811522776cfeefe3fa2b0

    SHA256

    c97ab40a01f9c6fb2a866134f401bb5d86f4a9d97b28bd1d81d95704099f91fd

    SHA512

    fbb352838a5202b2e9ba1ac951a47f4734609a457a8a8419efea5bd768599be8e54095546b954ba68d7e1b7eebe6b220fc2d50201538bdf123eb21eb152b5782

  • memory/2516-30-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2516-33-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2516-8-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2516-6-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2516-5-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2516-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2516-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2516-0-0x0000000000408000-0x0000000000791000-memory.dmp

    Filesize

    3.5MB

  • memory/2516-23-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2516-25-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2516-28-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2516-20-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2516-31-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2516-10-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2516-35-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2516-36-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2516-38-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2516-40-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2516-43-0x0000000000400000-0x0000000000D34000-memory.dmp

    Filesize

    9.2MB

  • memory/2516-44-0x0000000000400000-0x0000000000D34000-memory.dmp

    Filesize

    9.2MB

  • memory/2516-13-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2516-15-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2516-18-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2516-57-0x0000000000408000-0x0000000000791000-memory.dmp

    Filesize

    3.5MB

  • memory/2516-56-0x0000000000400000-0x0000000000D34000-memory.dmp

    Filesize

    9.2MB

  • memory/2752-55-0x00000000009E0000-0x0000000000A2A000-memory.dmp

    Filesize

    296KB